高级检索
    蒋瀚, 徐秋亮. 实用安全多方计算协议关键技术研究进展[J]. 计算机研究与发展, 2015, 52(10): 2247-2257. DOI: 10.7544/issn1000-1239.2015.20150763
    引用本文: 蒋瀚, 徐秋亮. 实用安全多方计算协议关键技术研究进展[J]. 计算机研究与发展, 2015, 52(10): 2247-2257. DOI: 10.7544/issn1000-1239.2015.20150763
    Jiang Han, Xu Qiuliang. Advances in Key Techniques of Practical Secure Multi-Party Computation[J]. Journal of Computer Research and Development, 2015, 52(10): 2247-2257. DOI: 10.7544/issn1000-1239.2015.20150763
    Citation: Jiang Han, Xu Qiuliang. Advances in Key Techniques of Practical Secure Multi-Party Computation[J]. Journal of Computer Research and Development, 2015, 52(10): 2247-2257. DOI: 10.7544/issn1000-1239.2015.20150763

    实用安全多方计算协议关键技术研究进展

    Advances in Key Techniques of Practical Secure Multi-Party Computation

    • 摘要: 在安全多方计算协议中,2个或多个持有秘密输入的参与方想要利用他们的输入来计算某个联合函数,并达到隐私性、正确性及输入无关性等安全要求.安全多方计算既是安全协议的一般性基础研究,也在许多应用领域(比如电子投票、网上合同签署、隐私信息检索等)有明确应用背景,其研究为密码学多个领域提供了核心工具.近年来,安全多方计算协议的研究,特别是在实用化技术方面取得了快速发展,协议实用化成为安全多方计算一个新的关注点.介绍了实用化安全多方计算协议研究的主要进展和成果,并重点介绍安全多方计算实用化的3个支撑性重要技术,包括混乱电路优化、剪切-选择技术及不经意传输扩展技术,这些技术在不同的方面显著提高了安全多方计算协议的效率.

       

      Abstract: In the setting of secure multi-party computation, two or more parties with private inputs wish to compute some joint function of their inputs and achieve the security requirements of privacy, correctness, independence of inputs and more. Secure multi-party computation is not only the general basic research of secure protocol, but also applied in many applications such as coin-tossing, electronic voting and private information retrieval schemes. The research of secure multi-party computation provides a central tool in many area of cryptography. In recent years,secure multi-party computation has been advancing in leaps and bounds, especially in the practical techniques; the practical technology becomes a new attractive field in secure multi-party computation. In this paper, we introduce the main advances and results of practical secure multi-party computation, and focus on three major supporting techniques, which include garbled circuits optimization, cut-and-choose technique and oblivious transfer extension.These techniques significantly improve the efficiency of secure multi-party computation in different aspects.

       

    /

    返回文章
    返回